CN1507623A - Recording medium, recording method, recording apparatus, and reproduction method - Google Patents
Recording medium, recording method, recording apparatus, and reproduction method Download PDFInfo
- Publication number
- CN1507623A CN1507623A CNA028053125A CN02805312A CN1507623A CN 1507623 A CN1507623 A CN 1507623A CN A028053125 A CNA028053125 A CN A028053125A CN 02805312 A CN02805312 A CN 02805312A CN 1507623 A CN1507623 A CN 1507623A
- Authority
- CN
- China
- Prior art keywords
- management information
- copyright management
- data
- content
- recording medium
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B7/00—Recording or reproducing by optical means, e.g. recording using a thermal beam of optical radiation by modifying optical properties or the physical structure, reproducing using an optical beam at lower power by sensing optical properties; Record carriers therefor
- G11B7/007—Arrangement of the information on the record carrier, e.g. form of tracks, actual track shape, e.g. wobbled, or cross-section, e.g. v-shaped; Sequential information structures, e.g. sectoring or header formats within a track
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00246—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is obtained from a local device, e.g. device key initially stored by the player or by the recorder
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00253—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
- G11B20/00282—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier the key being stored in the content area, e.g. program area, data area or user area
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00253—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
- G11B20/00297—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier the key being stored in a management area, e.g. the video manager [VMG] of a DVD
- G11B20/00304—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier the key being stored in a management area, e.g. the video manager [VMG] of a DVD the key being stored in the lead-in area [LIA]
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00253—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
- G11B20/00369—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier wherein a first key, which is usually stored on a hidden channel, e.g. in the lead-in of a BD-R, unlocks a key locker containing a second
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00485—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
- G11B20/00492—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
- G11B20/00521—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted wherein each session of a multisession recording medium is encrypted with a separate encryption key
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00485—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
- G11B20/00492—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
- G11B20/00528—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted wherein each title is encrypted with a separate encryption key for each title, e.g. title key for movie, song or data file
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
- G11B20/00746—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
- G11B20/00753—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
- G11B20/12—Formatting, e.g. arrangement of data block or words on the record carriers
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
- G11B20/12—Formatting, e.g. arrangement of data block or words on the record carriers
- G11B20/1217—Formatting, e.g. arrangement of data block or words on the record carriers on discs
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B27/00—Editing; Indexing; Addressing; Timing or synchronising; Monitoring; Measuring tape travel
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Storage Device Security (AREA)
- Television Signal Processing For Recording (AREA)
- Optical Recording Or Reproduction (AREA)
- Management Or Editing Of Information On Record Carriers (AREA)
Abstract
A recording medium, recording method and apparatus as well as a reproduction method, which the recording medium comprising a lead-in area, a data recording area that is formed on an outer periphery side of the lead-in area and in which a plurality of pieces of content data is recorded, and a lead-out area formed on an outer periphery side of the data recording area, wherein first copyright management information and second copyright management information with which copyrights of the plurality of pieces of content data are managed are recorded at different positions whose secrecies are different from each other.
Description
Technical field
The present invention relates to be used for the recording medium of recorded content data, the reproducting method that is used for the recording method and device of recorded content data and is used for rendition of content data; more specifically, relate to recording medium, recording method and device and the reproducting method that allows conventional transcriber rendition of content data and protect the content-data copyright.
Background technology
Developed a kind of disks, conventional CD-DA (compact-disc DAB) player and CD-ROM (compact-disc ROM (read-only memory)) be the optical disc replay data from then on, and this CD has the compatibility with computing machine.In this disks, content-data is encrypted and record, so that protect its copyright.The key information that is used for encrypted content data is write down in consideration in Lead-In Area.
In other words, in encrypted and when record, produce the problem relevant with the position of key information when content-data.For managing keys information safely, preferably it is stored on the position that the user is not easy to visit.Thereby, when video data recording is in the DVD (digital multi-purpose disk) for example, recording key information in Lead-In Area, and in the program area recording of encrypted data.Thereby, in this kind disks,, consider recording key information in Lead-In Area in order to prevent the easy access key information of user.
In the situation of DVD, because the content data encryption is being developed it under with the condition of protecting its copyright.Thereby, when recording key information in Lead-In Area, do not produce great problem.Yet, in the situation of this kind disks, if in Lead-In Area recording key information, conventional player and the driver that can not handle described disks just can not rendition of content data.
In other words, conventional CD-DA dish and CD-ROM dish are not under the condition of recording of encrypted content-data and develop.Thereby conventional player and driver do not possess the function that encrypted content data is decoded.When the enciphered data that reads from disks being decrypted, consider to carry out decrypting process to content-data with software with conventional player and driver.
Yet in the optical disc replay content-data, Lead-In Area can not be by softward interview at conventional player and driver.In other words, in the CD-ROM standard, sector sector accessing CD one by one one by one, each sector all is made up of 98 frames.In conventional player and driver rendition of content data, they are sector sector accessing CD one by one one by one.Thereby conventional player and driver can not be visited Lead-In Area.As a result, when recording key information in Lead-In Area, can not access key information owing to can not handle the conventional player of this kind disks and driver, therefore, they can not be decrypted content-data.
In Lead-In Area, after the recording key information, issue a kind of player and driver of handling disks in decision.Described player becomes the visit Lead-In Area with design of Driver, obtain key information, and use the key information that is obtained that encrypted content data is decrypted.Thereby, when the player that can handle disks and driver catch on, just can solve the problem that conventional player and driver can not be visited key information and rendition of content data in the Lead-In Area.
In transition period before the player that can handle disks and driver catch on, can not handle the conventional player of disks and driver from disks reading encrypted content-data, and encrypted content data is decrypted.Yet, in this transition period, owing to can not visit key information in the Lead-In Area, therefore, have the problem that can not be decrypted encrypted content data.
In order to solve this kind problem, consider recording key information in the program area, can be decrypted content-data so that can not handle the conventional driver and the player of disks.
Yet the confidentiality that is recorded in the key information in the program area is lower than and is recorded in the Lead-In Area.Thereby, when recording key information in the program area, can be although can not handle the conventional driver and the player of disks to the content data decryption, the key information that is recorded in the program area unlawfully extracts.The result thinks, because therefore content-data will can not be protected its copyright by illegal reproduction and copy.
Thereby, the purpose of this invention is to provide recording medium, recording method and device and reproducting method, the transcriber that they allow to handle encrypted content data is decrypted encrypted content data, and can protect its copyright safely.
Summary of the invention
The present invention is a kind of data carrier, wherein, the a plurality of content-datas of record in the program area, two types copyright management information of record on the mutually different diverse location of confidentiality, described copyright management information are first and second copyright management informations that are used to manage the copyright of a plurality of content-datas.
The present invention is a kind of data record method, may further comprise the steps: a plurality of content-datas of record in the program area of data carrier, and, on the mutually different diverse location of confidentiality, write down two types copyright management information, wherein, described copyright management information is first and second copyright management informations.
The present invention is a kind of data recording equipment, comprise: be used for parts at a plurality of content-datas of the program area of data carrier record, and the parts that are used on the different mutually diverse location of confidentiality, writing down two types copyright management information, wherein, described copyright management information is first and second copyright management informations.
The present invention is a kind of data carrier, wherein, in the program area, encrypt and write down a plurality of content-datas, the copyright management information of at least two types of records on the mutually different diverse location of confidentiality, described copyright management information is first and second key informations.
The present invention is a kind of data record method, may further comprise the steps: a plurality of content-datas are encrypted a plurality of content data recordings of also handle encryption in the program area of data carrier, and, on the mutually different diverse location of confidentiality, write down at least two types copyright management information, wherein, described copyright management information is first and second key informations.
The present invention is a kind of data recording equipment, comprise: be used for a plurality of content-datas are encrypted also the parts of a plurality of content data recordings of encrypting to the program area of data carrier, and, the parts that are used at least two types of key informations of record on the mutually different diverse location of confidentiality, wherein, described Key Tpe is first and second key informations.
Description of drawings
Fig. 1 is the planimetric map that is used to describe according to the example of CD of the present invention;
Fig. 2 is the synoptic diagram that is used to describe according to the example of CD of the present invention;
Fig. 3 is the synoptic diagram that is used to describe keylockers;
Fig. 4 is the synoptic diagram that is used to describe the example of described CD;
Fig. 5 is the block diagram that is used to describe the ciphering process of described CD;
Fig. 6 is the block diagram that is used to describe the decrypting process of described CD;
Fig. 7 is the synoptic diagram that is used to describe the keylockers of described CD;
Fig. 8 is the synoptic diagram that is used to describe the keylockers of described CD;
Fig. 9 is the synoptic diagram that is used to describe the keylockers of described CD;
Figure 10 is the synoptic diagram that is used to describe the keylockers of described CD;
Figure 11 A and 11B are the block diagram that is used to describe according to the ciphering process of CD of the present invention;
Figure 12 is the block diagram that is used to describe according to the decrypting process of CD of the present invention;
Figure 13 is the block diagram that is used to describe according to the decrypting process of CD of the present invention;
Figure 14 is the block diagram that is used to describe according to the keylockers of CD of the present invention;
Figure 15 is the block diagram that is used to describe according to the keylockers of CD of the present invention;
Figure 16 A and 16B are the block diagram according to the example of optical disc recording apparatus of the present invention;
Figure 17 is the block diagram that illustrates from the example of the transcriber of optical disc replay data according to the present invention;
Figure 18 is the block diagram that illustrates from another example of the transcriber of optical disc replay data according to the present invention; And
Figure 19 is the process flow diagram that is used to describe from another example of the transcriber of optical disc replay data according to the present invention.
Embodiment
Below, embodiments of the invention are described in conjunction with the accompanying drawings.Fig. 1 and Fig. 2 illustrate the structure according to CD of the present invention.Diameter according to CD 1 of the present invention is 120mm.Central authorities at CD 1 form hole 2.The physical form of CD 1 is identical with the shape of conventional CD.The CD that also has another kind of diameter 80mm is called single CD.
In addition, three types CD 1 is arranged, be divided into a reproduction pattern CD, write dispensable mould CD and recordable disc.
In a reproduction pattern CD 1, recording layer is made of aluminum.In a reproduction pattern CD 1, information is recorded as the physics hole.Usually, this kind dish is by pressing mold production.
In writing dispensable mould CD 1, recording layer is made by organic dyestuff such as phthalocyanine or cyanine.In writing the dispensable mould CD, when write data, the temperature that laser makes dish go up the recording layer of being made by organic dyestuff raises.As a result, the recording layer of being made by dyestuff is by thermal deformation.
But in rewriting type optical disk 1, recording layer is made by phase-change material.The phase-change material that uses for example is the alloy of Ag-In-Sb-Te (silver-indium-antimony-tellurium).This kind phase-change material has crystallization phase and amorphous phase.When the output level of laser was higher, when promptly the intensity of laser was higher, the temperature of the recording layer of being made by phase-change material raise and surpasses fusing point and then cooling rapidly.As a result, recording layer becomes amorphous state.When the output level of laser was low, when promptly the intensity of laser was relatively low, the temperature of the recording layer of being made by phase-change material raise cooling gradually subsequently.As a result, recording layer becomes crystalline state.
As shown in Figure 2, on the inner periphery of CD, form the first Lead-In Area L11.Outer placing at Lead-In Area L11 forms the first program area PA1.Outer placing at the first program area PA1 forms the first leading-out zone LO1.In the first program area PA1, with the identical record format record audio content-data of CD-DA (compact-disc DAB) standard.
Form the second Lead-In Area L12 in first leading-out zone LO1 outside.Outer placing at Lead-In Area L12 forms the second program area PA2.Form the second leading-out zone LO2 in the outside of the second program area PA2.In the second program area PA2, the voice data that has compressed according to for example ATRAC3 compressibility is encrypted, and be recorded as content-data.
The content key data are comprised among the first key locker data K_LOCK1, and are recorded among the second Lead-In Area L12, and the content key data are used for the encrypted content data of the second program area PA2 is decrypted.
For the conventional driver that allows to handle CD 1 is decrypted encrypted content data, be used for the content key data that the encrypted content data to the second program area PA2 is decrypted and be comprised among the second key locker data K_LOCK2, and be recorded among the program area PA2.
In addition, the application data of logging software player SFT1 in program area PA2, SFT1 is used for decrypting process program that the encrypted content data that is recorded in program area PA2 is decrypted.
Key locker data K_LOCK1 and K_LOCK2 have been encoded and the data of the content key data of encrypting.Key locker data K_LOCK1 and K_LOCK2 also comprise copyright management information DRM (digital rights management).
Key locker data is to be encoded and the data of a plurality of content key data of encrypting.Because a plurality of content key data that have been encoded and encrypted can be processed into the true case of depositing a plurality of content keys.Thereby they are called key locker data.
In addition, copyright management information DRM can be included in the key locker data, uses copyright management information DRM to carry out copyright management, as the reproduction restriction and the copy restriction of each content-data.For copyright management information DRM, for example can specify " only allowing to reproduce " and " allowing to reproduce and copy ".In addition, can specify copy number of times in " copy restriction ", the copy restriction as " once copy ", " five copies " etc.In addition, consider to specify " copy that allows network allocation or distribute data ".
Fig. 3 is the structure example of keylockers part.As shown in Figure 3, at the place that begins of keylockers part, form the data division of expression version number.Secondly, form the data division of expression content key data bulk.Then, form with content key data bulk content corresponding key data KC1, KC2 ....For example, content key data KC1, KC2 ... each all is made up of 48 bytes.Subsequently, form expression copyright management information quantity data part.Then, form quantity corresponding copyright management information DRM1, the DRM2 represented with data division ....For example, copyright management information DRM1, DRM2 ... each all is made up of 16 bytes.Then, add CRC (cyclic redundancy check (CRC)) sign indicating number that is used to detect 16 byte errors.The structure of key locker data shown in Figure 3 is an example.Thereby key locker data has other structure.
The form that is recorded in the key locker data K_LOCK1 among the Lead-In Area L12 is different with the form of key locker data K_LOCK2 in being recorded in program area PA2.In other words, the key locker data K_LOCK1 among the high security Lead-In Area L12 has higher added value than the key locker data K_LOCK2 in the low confidentiality program area.
Thereby, as shown in Figure 2, in CD 1 according to the present invention, the record first key locker data K_LOCK1 in Lead-In Area L12, and in program area PA2, write down the second key locker data K_LOCK2.
In the time handling CD 1 and the player that will announce in the near future and driver from CD 1 rendition of content data, their visit Lead-In Area L12 and from the first key locker data K_LOCK1 reading of data.The first key locker data K_LOCK1 content key data KC1, KC2 ..., use content key data KC1, KC2 ... each encrypted content data among the program area PA2 that is recorded in CD 1 is decrypted.By extract from key locker data K_LOCK1 content key data KC1, KC2 ..., can the encrypted content data among the program area PA2 be decrypted.
Be used for the software process of access program district PA2 by execution, conventional player and the driver that can not handle CD 1 can be from the second key locker data K_LOCK2 reading of data.In other words, player and driver can from second key locker data extract content key data KC1, KC2 ..., and with content key data KC1, KC2 ... the encrypted content data that is recorded among the program area PA2 is carried out decrypting process.
The ciphering process and the decrypting process of the content-data that is used for CD 1 of the present invention are below described.Be used in description describing their basic ciphering process and decrypting process before the ciphering process and decrypting process of content-data of CD 1 of the present invention.
As shown in Figure 4, at the CD 1A that is used for describing basic ciphering process and decrypting process, on the inner periphery of CD 1A, form the first Lead-In Area L110.Outer placing at Lead-In Area L110 forms the first program area PA10.At the peripheral first leading-out zone LO10 that forms of the first program area PA10.In the first program area PA10, with the record format record audio content-data identical with the CD-DA standard.At the peripheral second Lead-In Area L120 that forms of the first leading-out zone LO10.Outer placing at Lead-In Area L120 forms the second program area PA20.Form the second leading-out zone LO20 in the periphery of second program area.In the second program area PA20, record has compressed and content data encrypted according to for example ATRAC3.The content key data are included among the keylockers K_LOCK0, and are recorded among the second Lead-In Area L120, use the content key data that the encrypted content data that writes down in the second program area PA20 is decrypted.
Fig. 5 illustrates and is used for recording the process of the second program area PA20 of conventional CD 1A to the content data encryption and it.
In Fig. 5, content-data C1, C2 ... offer respectively content- data input end 11A, 11B ....For example, content-data C1, C2 ... be voice data according to the music program of the compression of ATRAC3 for example.From content- data input end 11A, 11B ... content-data C1, the C2 that provides ... offer respectively encrypted circuit 12A, 12B ....
By content key produce circuit 13 produce be used for to each content-data C1, C2 ... content key data KC1, the KC2 of encryption ....From content key produce content key data KC1, KC2 that circuit 13 provides ... offered respectively encrypted circuit 12A, 12B ....
From content- data input end 11A, 11B ... content-data C1, the C2 that provides ... respectively by encrypted circuit 12A, 12B ... use content key data KC1, KC2 ... encrypt.By encrypted circuit 12A, 12B ... content data encrypted C1e, C2e ... be recorded among the program area PA2 of CD.
From content key produce content key data KC1, KC2 that circuit 13 provides ... be provided for keylockers and produce circuit 14.
Offer content- data input end 11A, 11B ... each content-data C1, C2 ... comprise respectively copyright management information DRM1, DRM2 ....Copyright management information DRM1, DRM2 ... be according to the copyright management of each content-data being represented reproducing limit information and copy restricted information.By DRM produce circuit 15 produce copyright management information DRM1, DRM2 ....For copyright management information DRM1, DRM2 ..., specify reproduction permission or forbid, copy permission or forbid, once the copy permission or repeatedly copy permit etc.By DRM produce copyright management information DRM1, DRM2 that circuit 15 produces ... offer keylockers and produce circuit 14.
Keylockers produce 14 pairs in circuit from content key produce content key data KC1, KC2 that circuit 13 sends ... and from DRM produce copyright management information DRM1, DRM2 that circuit 15 provides ... encode, and produce key locker data.The output data that keylockers produces circuit 14 offers encrypted circuit 18.
Keylocker cipher key data KL offers encrypted circuit 18 from hash counting circuit 16.Calculate and produce keylocker cipher key data KL by device key data KD and Hidden Codes key data KH being carried out hash.Keylockers produces the key locker data of circuit 14 generations and uses the keylocker cipher key data KL that provides from hash counting circuit 16 to encrypt.
In other words, device key data KD offers hash counting circuit 16.In addition, Hidden Codes key data KH produces circuit from the Hidden Codes key and offers hash counting circuit 16.Device key data KD is stored in player and register somewhere.Produce the Hidden Codes key data KH that circuit 17 produces as random number by the Hidden Codes key.Hidden Codes key data KH is recorded among the Lead-In Area L120 of CD 1A for example.
Thereby, in the ciphering process of conventional CD 1A, each content-data C1, C2 ... use respectively content key data KC1, KC2 ... encrypt, and record among the program area L120.Be used for to each content-data C1, C2 ... content key data KC1, the KC2 of encryption ... with copyright management information DRM1, DRM2 ... be stored in together among the key locker data K_LOCK0, and encrypted and be recorded among the Lead-In Area L120 of CD 1A.
Fig. 6 illustrate be used for respectively to be recorded in encrypted content data C1e, C2e on the CD 1A ... be decrypted and obtain content-data C1, C2 ... process.
From program area PA20 reading encrypted content-data C1e, C2e ....Encrypted content data C1e, C2e ... offer respectively decrypt circuit 23A, 23B ....
Reproduce encrypted secret key case data K_LOCK0 and Hidden Codes key data KH from the Lead-In Area L120 of CD 1A.Key locker data K_LOCK0 sends to decrypt circuit 26.On the other hand, Hidden Codes key data KH sends to hash counting circuit 22.
Extract the device key data KD that leaves in transcriber or the device somewhere.Device key data KD sends to hash counting circuit 22.Hash counting circuit 22 usefulness Hidden Codes key data KH and device key data KD produce keylocker cipher key data KL.Keylocker cipher key data KL sends to decrypt circuit 26.
Content key data KC1, the KC2 that extracts by keylockers reproducing circuit 21 ... offer respectively decrypt circuit 23A, 23B ....Copyright management information DRM1, the DRM2 that extracts by keylockers reproducing circuit 21 ... send to DRM and determine circuit 24.
DRM determine its copyright management information of circuit 24 usefulness DRM1, DRM2 ... determine to each content-data C1, C2 ... reproduction restriction and copy restriction.To each content-data C1, C2 ... reproducing limit information and the copy restricted information offer the copy and reproducing control circuit 25.
Copy and reproducing control circuit 25 be according to reproducing limit information and the copy restricted information of determining that from DRM circuit 24 provides, and to each content-data C1, C2 ... carry out and reproduce restriction and copy limits.
Thereby, at the decrypting process that is used for CD 1A, read key locker data K_LOCK0 from the Lead-In Area L120 of CD 1A.Keylockers reproducing circuit 21 from key locker data K_LOCK0 extract content key data KC1, KC2 ... and copyright management information DRM1, DRM2 ....Encrypted content data C1e, the C2e that reads from the program area PA20 of CD ... send to respectively decrypt circuit 23A, 23B ....Content key data KC1, the KC2 that extracts with the key locker data K_LOCK0 from Lead-In Area L120 ... to content-data C1, C2 ... be decrypted.Keylockers reproducing circuit 21 extract copyright management information DRM1, DRM2 ....According to copyright management information DRM1, DRM2 ..., control each content-data C1, C2 ... reproduction and copy.
In this way, to each content-data C1, the C2 of CD 1A ... encrypt.Each content-data C1, C2 ... comprise respectively copyright management information DRM1, DRM2 ....Can to each content-data C1, C2 ... specify reproducing condition and copy condition respectively.Thereby, for the identical content data that are recorded among the program area PA20, the number of content key data KC1, KC2 in being stored in key locker data K_LOCK0 change or be stored in copyright management information DRM1, DRM2 among the key locker data K_LOCK ... reproduction restriction and copy restriction when changing, change reproducible content data, reproducing condition and copy condition.
In other words, in Fig. 7 and example shown in Figure 8, identical content-data C1, C2, C3, C4 and C5 in the program area of CD PA2, have been write down.In example shown in Figure 7, content key data KC1, KC2, KC3, KC4 and the KC5 and copyright management information DRM1, DRM2, DRM3, DRM4 and the DRM5 that are used for content-data C1, C2, C3, C4 and C5 have been write down.In the case, when copyright management information DRM1, DRM2, DRM3, DRM4 and DRM5 represent reproduction permission, can all content-data C1, C2, C3, C4 and C5 be decrypted.
In example shown in Figure 8, although with example shown in Figure 7 similarly recorded content data C1, C2, C3, C4 and C5 in CD 1A, only record is used for content key data KC1, KC2 and KC3 and copyright management information DRM1, DRM2 and the DRM3 of content-data C1, C2 and C3 in key locker data K_LOCK0.In the case, although recorded content data C1, C2, C3, C4 and C5, only rendition of content data C1, C2 and C3 on CD 1A.
Thereby, even in CD 1A, write down identical content-data, but when restriction is stored in the quantity of the content key data among the key locker data K_LOCK0, also limit the quantity of reproducible content data.
In Fig. 9 and example shown in Figure 10, identical content-data C1, C2, C3, C4 and C5 in the program area of CD 1A PA20, have been write down.In example shown in Figure 9, recorded content key data KC1, KC2, KC3, KC4 and KC5 and expression copy copyright management information DRM1, DRM2, DRM3, DRM4 and the DRM5 that permits in key locker data K_LOCK0.In the case, because all copyright management information DRM1, DRM2, DRM3, DRM4 and DRM5 represent the copy permission, therefore, can copy all content-data C1, C2, C3, C4 and C5.
In example shown in Figure 10, although with example shown in Figure 9 similarly recorded content data C1, C2, C3, C4 and C5 in CD 1A, recorded content key data KC1, KC2, KC3, KC4 and KC5 and expression copy are forbidden in key locker data K_LOCK0 copyright management information DRM1, DRM2, DRM3, DRM4 and DRM5.In the case,, forbid all copyright management information DRM1, DRM2, DRM3, DRM4 and DRM5 because representing copy, therefore, and can not copied content data C1, C2, C3, C4 and C5.
Thereby, even identical content-data C1, C2, C3, C4 and the C5 of record in CD 1A, but when changing copyright management information DRM1, the DRM2 be stored among the key locker data K_LOCK0, DRM3, DRM4 and DRM5, also change reproducible content data bulk, copy condition and reproducing condition.
According to embodiments of the invention, use this structure, even reproduce data, also can not handle the conventional driver of CD 1, and change reproducible content data bulk, copy condition and reproducing condition according to being to use the driver that to handle CD 1 also to be to use from same disc.
Below, ciphering process and decrypting process according to CD 1 of the present invention are described.
Figure 11 A and Figure 11 B illustrate the ciphering process according to CD 1 of the present invention.In Figure 11 A and Figure 11 B, content-data C1, C2 ... offer respectively content- data input end 31A, 31B, 31C ....Content-data C1, C2 ... be the content-data that has for example compressed according to ATRAC3.From content- data input end 31A, 31B, 31C ... content-data C1, the C2 that provides ... offer respectively encrypted circuit 32A, 32B ....
Be used for to each content-data C1, C2 ... content key data KC1, the KC2 of encryption ... produce circuit 33 by content key and produce.Content key data KC1, KC2 ... offer respectively encrypted circuit 32A, 32B ....
From content key produce content key data KC1, KC2 that circuit 33 provides ... offer selector switch 38A and 38B.Content key data KC1, the KC2 that selector switch 38A and 38B produce from content key generation circuit 33 ... the content key data that middle selection is required.The content key data that selector switch 38A and 38B select offer keylockers respectively and produce circuit 34A and 34B.
Offer content- data input end 31A, 31B ... each content-data C1, C2 ... comprise respectively copyright management information DRM1, DRM2 ....Copyright management information DRM1, DRM2 ... be and content-data is carried out the relevant reproducing limit information of copyright management and to copy restricted information.For copyright management information DRM1, DRM2 ..., can specify reproduction permission or forbid, copy permission or forbid, once copy permission or forbid or repeatedly copy permission etc.
Keylockers produce circuit 34A to the content key data KC1, the KC2 that produce circuit 33 from content key and send ... and from DRM produce copyright management information DRM1A, DRM2A that circuit 35A sends ... encode, and produce the data that will record in the keylockers part.The output data that keylockers produces circuit 34A offers encrypted circuit 41A.
Provide keylocker cipher key data KL1 from hash counting circuit 36A to encrypted circuit 41A.Calculate and produce keylocker cipher key data KL1 by device key data KD and Hidden Codes key data KH1 being carried out hash.With keylocker cipher key data KL1 the data that provide and will record the keylockers part from keylockers generation circuit 34A are encrypted.
In other words, device key data KD offers hash counting circuit 36A.In addition, the Hidden Codes key data KH1 that provides from Hidden Codes key generation circuit 37A offers hash counting circuit 36A.Device key data KD is stored in the somewhere in player and the register.Produce the Hidden Codes key data KH1 of circuit 37A generation by the Hidden Codes key as random number.Hidden Codes key data KH1 is recorded among the importing data L12 of CD 1 for example.
Record is by the 34A generation of keylockers generation circuit and by encrypted circuit 41A encrypted secret key case data K_LOCK1 in the Lead-In Area L12 of CD 1.
Keylockers produce circuit 34B to the content key data KC1, the KC2 that produce circuit 33 from content key and send ... with produce from DRM copyright management information DRM1B, DRM2B that circuit 35B sends ... encode, and produce key locker data.The key locker data that is produced circuit 34B generation by keylockers offers encrypted circuit 41B.
The keylocker cipher key data KL2 that provides from hash counting circuit 36B offers encrypted circuit 41B.Encrypted circuit 41B uses the keylocker cipher key data KL2 that provides from hash counting circuit 36B that the key locker data that provides from keylockers generation circuit 34B is encrypted.Calculate and produce keylocker cipher key data KL2 by device key data KD and Hidden Codes key data KH2 being carried out hash.
In other words, device key data KD offers hash counting circuit 36B.In addition, the Hidden Codes key data KH2 that provides from Hidden Codes key generation circuit 37B offers hash counting circuit 36B.Produce the Hidden Codes key data KH2 of circuit 37B generation by the Hidden Codes key as random number.Hidden Codes key data KH2 is recorded among the program area PA2 of CD 1 for example.
Record is by the 34B generation of keylockers generation circuit and by encrypted circuit 41B encrypted secret key case data K_LOCK2 in the program area of CD 1 PA2.
Program produces circuit 40 and produces the application data that is used for software player SFT1, wherein, with SFT1 content-data is decrypted.The application data of logging software player SFT1 in the program area of CD PA2.
As mentioned above, in the ciphering process of CD 1 according to the present invention, each content-data C1, C2 ... use respectively content key data KC1, KC2 ... encrypt, and be recorded among the program area PA2 of CD 1.Be used for to each content-data C1, C2 ... content key data KC1, the KC2 of encryption ... with copyright management information DRM1A, DRM2A ... be stored in together among the key locker data K LOCK1, and be recorded among the Lead-In Area L12 of CD 1.In addition, be used for to each content-data C1, C2 ... content key data KC1, the KC2 of encryption ... with copyright management information DRM1B, DRM2B ... be stored in together among the key locker data K_LOCK2, and be recorded among the program area PA2 of CD 1.
Figure 12 and Figure 13 illustrate the decrypting process according to CD 1 of the present invention.In CD according to the present invention, at the driver that can handle CD 1 and player performed decrypting process during from CD 1 rendition of content data, with the driver that can not handle CD 1 and player during from CD 1 rendition of content data performed decrypting process different.Performed decrypting process when Figure 12 is illustrated in the driver that can handle CD 1 or player from CD 1 rendition of content data.Performed decrypting process when Figure 13 is illustrated in the driver that can not handle CD 1 or player from CD 1 rendition of content data.
In Figure 12, from the program area PA2 of CD 1 reproduce encrypted content data C1e, C2e ....Encrypted content data C1e, C2e ... offer respectively decrypt circuit 43A, 43B, 43C ....
Read key locker data K_LOCK1 and Hidden Codes key data KH1 from the Lead-In Area L12 of CD 1.Key locker data K_LOCK1 offers decrypt circuit 47.
Read Hidden Codes key data KH1 from the Lead-In Area L12 of CD 1.Hidden Codes key data KH1 offers hash counting circuit 42.Extract device key data KD from the device or the device that reproduce CD 1.Device key data KD sends to hash counting circuit 42.Hash counting circuit 42 uses Hidden Codes key data KH1 and device key data KD to produce keylocker cipher key data KL1.Keylocker cipher key data KL1 sends to keylockers reproducing circuit 48.
Content key data KC1, the KC2 that extracts by keylockers reproducing circuit 48 ... offer respectively decrypt circuit 43A, 43B ....Copyright management information DRM1A, the DRM2A that extracts by keylockers reproducing circuit 48 ... offer DRM and determine circuit 44.
DRM determine its copyright management information of circuit 44 usefulness DRM1A, DRM2A ... determine respectively to each content-data C1, C2 ... reproduction restriction and copy restriction.To each content-data C1, C2 ... reproducing limit information and the copy restricted information offer the copy and reproducing control circuit 45.
As mentioned above, in the decrypting process of the driver that can handle CD 1 and player, read key locker data K_LOCK1 from the Lead-In Area L12 of CD 1.Keylockers reproducing circuit 48 from key locker data K_LOCK1 extract content key data KC1, KC2 ... and copyright management information DRM1A, DRM2A ....Encrypted content data C1e, the C2e that reproduces from the program area PA2 of CD 1 ... send to respectively decrypt circuit 43A, 43B ....Content key data KC1, the KC2 that extracts with key locker data K_LOCK1 from Lead-In Area L12 ... to encrypted content data C1e, C2e ... be decrypted.As a result, obtain content-data C1, C2 ....Keylockers reproducing circuit 48 obtain copyright management information DRM1A, DRM2A ..., and with copyright management information DRM1A, DRM2A ... control respectively each content-data C1, C2 ... reproduction and copy.
Figure 13 illustrates the conventional player that can not handle CD 1 and the decrypting process of driver.
In Figure 13, from the application data of the program area PA2 reading software player SFT1 of CD 1.The application data of software player SFT1 sends to software program executive circuit 60.According to the application data of software player SFT1, carry out decrypting process by software.The application of software player SFT1 is not a main body of carrying out the application of decrypting process, but its part.
Read key locker data K_LOCK2 and Hidden Codes key data KH2 from program area PA2.Key locker data K_LOCK2 offers decrypt circuit 57.
Hidden Codes key data KH2 sends to hash counting circuit 52.From device, extract device key data KD.Device key data KD sends to hash counting circuit 52.Hash counting circuit 52 usefulness Hidden Codes key data KH2 and device key data KD produce keylocker cipher key data KL2.Keylocker cipher key data KL2 sends to decrypt circuit 57.
The keylocker cipher key data KL2 that decrypt circuit 57 usefulness provide from hash counting circuit 52 is decrypted the data of key locker data K_LOCK2.Key locker data K_LOCK2 by decrypt circuit 57 deciphering offers keylockers reproducing circuit 51.
Keylockers reproducing circuit 51 from key locker data K_LOCK2 extract content key data KC1, KC2 ... and copyright management information DRM1B, DRM2B ....Content key data KC1, the KC2 that extracts by keylockers reproducing circuit 51 ... offer respectively decrypt circuit 53A, 53B, 53C ....Copyright management information DRM1B, the DRM2B that extracts by keylockers reproducing circuit 51 ... send to DRM and determine circuit 54.
DRM determine circuit 54 usefulness copyright management information DRM1B, DRM2B ... determine respectively to each content-data C1, C2 ... reproduction restriction and copy restriction.Each content-data C1, C2 ... reproducing limit information and the copy restricted information send to the copy and reproducing control circuit 55.
Decrypt circuit 53A, 53B, 53C ... respectively encrypted content data C1e, the C2e that the program area PA2 from CD 1 is reproduced, C3e ... be decrypted, and obtain deciphering content-data C1, C2 ....Content-data C1, the C2 of deciphering ... send to copy and reproducing control circuit 55.Copy and reproducing control circuit 55 usefulness from DRM determine reproducing limit information that circuit 54 provides and copy restricted information to content-data C1, C2 ... carry out and reproduce restriction and copy limits.
In the decrypting process of the driver that can not handle CD 1 and player, read key locker data K_LOCK2 from the program area PA2 of CD 1.Keylockers reproducing circuit 51 from key locker data K_LOCK2 extract content key data KC1, KC2 ... and copyright management information DRM1B, DRM2B ....Encrypted content data C1e, the C2e that reproduces from the program area PA2 of CD 1 ... send to respectively decrypt circuit 43A, 43B ....Content key data KC1, the KC2 that extracts with key locker data K_LOCK2 from program area PA2 ... respectively to encrypted content data C1e, C2e ... be decrypted.As a result, obtain deciphering content-data C1, C2 ....By keylockers reproducing circuit 51 extract copyright management information DRM1B, DRM2B ....With copyright management information DRM1B, DRM2B ... control each content-data C1, C2 ... reproduction and copy.
Shown in Figure 11 A and Figure 11 B, in the ciphering process of CD 1 according to the present invention, selector switch 38A and 38B are set.Selector switch 38A and 38B from the content key data KC1, the KC2 that offer keylockers and produce circuit 34A and 34B ... required content key data KC1, the KC2 of middle selection ..., and comprise selected content key data among key locker data K_LOCK1 and the K_LOCK2.Arrange that separately DRM produces circuit 35A and DRM produces circuit 35B, wherein, DRM produce circuit 35A produce the copyright management information DRM1A, the DRM2A that are included among the key locker data K_LOCK1 ..., DRM produce circuit 35B produce the copyright management information DRM1B, the DRM2B that are included among the key locker data K_LOCK2 ..., wherein, K_LOCK1 is recorded among the Lead-In Area L12, and K_LOCK2 is recorded among the program area PA2.Selector switch 39A and 39B respectively from offer copyright management information DRM1A, DRM2A that keylockers produces circuit 34A and 34B ... and DRM1B, DRM2B ... the copyright management information that middle selection is required.
Thereby, can specify separately the content key data KC1, the KC2 that are included among the key locker data K_LOCK1 ... and copyright management information DRM1A, DRM2A ... and be included in content key data KC1, KC2 among the key locker data K_LOCK2 ... and copyright management information DRM1B, DRM2B ..., wherein, key locker data K_LOCK1 is recorded in the Lead-In Area L12, and key locker data K_LOCK2 is recorded in the program area PA2.
In this kind structure, when the content of the key locker data K_LOCK1 of independent designated recorder in Lead-In Area L12 with when being recorded in the content of the key locker data K_LOCK2 in the program area PA2, content-data that is reproduced by the player that can handle CD 1 and driver and the content-data that is reproduced by the driver that can not handle CD 1 and player are being distinguishing aspect quantity, title, reproducing condition and the copy condition of reproducible content data.
In other words, suppose only to be taken at the key locker data K_LOCK1 that writes down in the Lead-In Area L12 by player and the drive read that can handle CD 1.Thereby because confidentiality is higher, therefore, the possibility of illegal reproduction and copied content data is lower.On the contrary, be taken at the key locker data K_LOCK2 that writes down in the program area PA2 by conventional player and drive read.Thereby because confidentiality is lower, therefore, the possibility of illegal reproduction and copied content data is higher.
Thereby think, key locker data K_LOCK2 in low confidentiality program area PA2 compares with service recorder, by the key locker data K_LOCK1 of service recorder in high security Lead-In Area L12, the quantity of reproducible content increases, the quality of reproducible content is higher, perhaps the regulatory limits according to copyright management is more favourable, as it is more to have the added value of supplementary.As a result, use supplementary can increase added value.
For example, as shown in figure 14, suppose in the program area of CD PA2 recorded content data C1, C2, C3, C4, C5 ....Among the key locker data K_LOCK1 in high security Lead-In Area L12, recorded content data C1, C2, C3, C4, C5 ... content key data KC1, KC2, KC3, KC4 and KC5.In addition, record copyright management information DRM1A, DRM2A, DRM3A, DRM4A, DRM5A ....
On the contrary, among the key locker data K_LOCK2 in low confidentiality program area PA2, recorded content data C1, C2, C3 ... content key data KC1, KC2, KC3 ... and copyright management information DRM1B, DRM2B, DRM3B ....
In the case, when the key locker data K_LOCK1 that uses in Lead-In Area L12, can to all content-data C1, C2, C3, C4, C5 ... be decrypted and reproduce.On the contrary, when the key locker data K_LOCK2 that uses in program area PA2 owing to be not used in content key data KC4 and KC5 to content-data C4 and C5 deciphering, therefore, only reproduce three content-data C1, C2, C3 ....
Thereby, although can handle the novel player of CD 1 and driver reproducible content data C1, C2, C3, C4, C5 ..., can not handle the driver of CD 1 and player can only rendition of content data C1, C2, C3 ....
In this example, use the key locker data K_LOCK1 in high security Lead-In Area L12, the key locker data K_LOCK2 of the quantity of the reproducible content data of added value ratio use in program area PA2 is bigger thus.
For example, as shown in figure 15, among the key locker data K_LOCK1 in high security Lead-In Area L12, recorded content data C1, C2, C3, C4, C5 ... content key data KC1, KC2, KC3, KC4 and KC5 and copyright management information DRM1, DRM2, DRM3, DRM4, DRM5 ....All copyright management information DRM1A, DRM2A, DRM3A, DRM4A, DRM5A ... all represent the copy permission.
On the contrary, among the key locker data K_LOCK2 in low confidentiality program area PA2, recorded content data C1, C2, C3, C4, C5 ... content key data KC1, KC2, KC3, KC4 and KC5 and copyright management information DRM1B, DRM2B, DRM3B, DRM4B, DRM5B ....All copyright management information DRM1B, DRM2B, DRM3B, DRM4B, DRM5B ... represent that all copy forbids.
In the case, during key locker data K_LOCK1 in using Lead-In Area L12, can copy record all the elements data C1, C2, C3, C4, C5 ....Yet, when the key locker data K_LOCK2 among the service routine district PA2, can not copy all content-data C1, C2, C3, C4, C5 ....
Thereby, but although can handle the novel player of CD 1 and driver copied content data C1, C2, C3, C4, C5 ..., can not handle the player of CD 1 and driver also can rendition of content data C1, C2, C3, C4, C5 ..., but the latter can not copy them.
In this example, use the key locker data in the high security Lead-In Area to compare with using the key locker data in low confidentiality program area, more favourable according to the regulatory limits of copyright management, and added value becomes higher.
Thereby, when in Lead-In Area L12 and program area PA2, writing down key locker data K_LOCK1 and K_LOCK2 respectively, the key locker data K_LOCK1 of use in high security Lead-In Area L12 compares with using the key locker data K_LOCK2 in program area PA2, the quantity of the former reproducible content data is bigger, copyright management is more favourable, and added value is bigger.
Key locker data K_LOCK1 and the K_LOCK2 of hypothetical record in high security Lead-In Area L12 and low confidentiality program area PA2 has following structure.
Among the key locker data K_LOCK1 in being recorded in Lead-In Area and/or leading-out zone, the quantity of copyright management information lower than among the key locker data K_LOCK2 that is recorded in the program area, wherein, Lead-In Area and/or leading-out zone are the high security record position, and the program area is low confidentiality record position.As a result, the copyright management information of service recorder in Lead-In Area and/or leading-out zone compared with the copyright management information of service recorder in the program area, but the quantity of the former reproducing music program is bigger.
Among the key locker data K_LOCK1 in being recorded in Lead-In Area and/or leading-out zone, the regulatory limits of copyright management information more loose than among the key locker data K_LOCK2 that is recorded in the program area, wherein, Lead-In Area and/or leading-out zone are the high security record position, and the program area is low confidentiality record position.For example, when the copyright management information of the keylockers in being recorded in Lead-In Area and/or leading-out zone was represented the copy permission, the copyright management information of program area was represented to copy and is forbidden.Similarly, when the copyright management information of the key locker data in being recorded in Lead-In Area and/or leading-out zone represented repeatedly to copy permission, the copyright management information of program area represented once to copy permission.
The copyright management information that is recorded in the key locker data K_LOCK1 in Lead-In Area and/or the leading-out zone is compared with the copyright management information of key locker data K_LOCK2 in being recorded in the program area, the former represents higher-quality content-data and more added value with supplementary, wherein, Lead-In Area and/or leading-out zone are the high security record position, and the program area is low confidentiality record position.For example, when the copyright management information of the key locker data K_LOCK1 in Lead-In Area and/or leading-out zone was represented the reproduction permission of all music programs, the copyright management information of the key locker data K_LOCK2 in the program area was only represented the reproduction permission to characteristic or music program narration.In this way, content quality is distinguishing.Replacedly, the copyright management information that is recorded in the key locker data K_LOCK1 in Lead-In Area and/or the leading-out zone comprises music program and static propaganda image and motion video.On the contrary, the copyright management information of the key locker data K_LOCK2 in the program area only comprises music program, omits their static propaganda image and motion video.In this way, the copyright management information of the copyright management information of key locker data K_LOCK1 and key locker data K_LOCK2 is distinguishing.
Be recorded in the key locker data K_LOCK1 in Lead-In Area and/or the leading-out zone the content key data quantity than the key locker data K_LOCK2 of program area still less, wherein, Lead-In Area and/or leading-out zone are the high security record position, and the program area is low confidentiality record position.Thereby, with bigger than with the content key data reproduction that is recorded in the key locker data K_LOCK2 in the program area of the quantity of the music program of the content key data reproduction of the keylockers among the key locker data K_LOCK1 that is recorded in Lead-In Area and/or the leading-out zone.
The content key data of key locker data K_LOCK2 in the content key data of the key locker data K_LOCK1 of service recorder in Lead-In Area and/or leading-out zone and the service routine district are compared, the former available secondary supplementary information reproduces higher-quality content and obtains more added value, wherein, Lead-In Area and/or leading-out zone are the high security record position, and the program area is low confidentiality record position.For example, the content key data of the key locker data K_LOCK1 of service recorder in Lead-In Area and/or leading-out zone can be reproduced all music programs, and wherein, Lead-In Area and/or leading-out zone are the high security record position.On the contrary, the content key data of the key locker data K_LOCK2 of service recorder in the program area, the then characteristic and the narration of a reproducing music program.In this way, the quality of the content-data that will reproduce is distinguishing.Replacedly, the content key data that are recorded in the key locker data K_LOCK1 in Lead-In Area and/or the leading-out zone are the key datas that are used for music program and static propaganda image and motion video.On the contrary, the content key data that are recorded in the key locker data K_LOCK2 in the program area are the key datas that only are used for music program, and ignore static propaganda image and motion video.In this way, they are distinguishing.
Thereby, the novel player and the driver of CD of the present invention can be handled and the player of CD of the present invention can not be handled and driver is being distinguishing aspect the quantity of reproducible content and quality and the added value.In addition, can protect the copyright of content-data.
Below, the real structure of description pen recorder.In Figure 16 and 16B, the content-data that will record among the program area PA1 offers input end 100.This content-data is the voice data identical with the data that meet the CD-DA standard.The content-data that provides from input end 100 offers error correcting code coding circuit 104.
The content-data that will record among the program area PA2 offers input end 101.This content-data is the voice data according to compressibility such as ATRAC3 compression.This content-data offers encrypted circuit 102.
Encrypted circuit 102 is encrypted each content-data.From content key produce circuit 103 to encrypted circuit 102 provide content key data KC1, KC2 ....Content key data KC1, the KC2 of content key generation circuit 103 each contents of generation ....The content-data that provides from input end 101 use from content key produce content key data KC1, KC2 that circuit 103 provides ... encrypt.The output of encrypted circuit 102 offers error correcting code coding circuit 104.
Content key data KC1, the KC2 that content key generation circuit 103 produces ... offer keylockers and produce circuit 105A.In addition, content key data KC1, KC2 ... offer keylockers and produce circuit 105B.From DRM produce circuit 106A and 106B respectively to keylockers produce circuit 105A and 105B provide copyright management information DRM1A, DRM2A ... and DRM1B, DRM2B ....
DRM produce circuit 106A produce copyright management information DRM1A, the DRM2A that will be included among the key locker data K_LOCK1 ..., wherein, key locker data K_LOCK1 is recorded among the Lead-In Area L12.DRM produce circuit 106B produce copyright management information DRM1B, the DRM2B that will be included among the key locker data K_LOCK2 ..., wherein, key locker data K_LOCK2 is recorded among the program area PA2.
Keylockers produces circuit 105A and produces the key locker data K_LOCK1 that is recorded among the Lead-In Area L12.The key locker data K_LOCK1 that is recorded among the Lead-In Area L12 offers encrypted circuit 108A.Provide keylocker cipher key data KL1 from hash counting circuit 110A to encrypted circuit 108A.Keylocker cipher key data KL1 is produced by hash counting circuit 110A.Hash counting circuit 110A carries out hash calculating to secrete key data KH1 and the device key data KD that provides from secrete key generation circuit 109A.Encrypted circuit 108A encrypts key locker data K_LOCK1.Offer the secondary sign indicating number of TOC (contents table) by encrypted circuit 108A encrypted secret key case data K_LOCK1 and produce circuit 112.The secrete key data KH1 that provides from secrete key generation circuit 109A offers the secondary sign indicating number generation of TOC circuit 112.
Keylockers produces circuit 105B and produces the key locker data K_LOCK2 that is recorded among the program area PA2.The key locker data K_LOCK2 that is recorded among the program area PA2 offers encrypted circuit 108B.Provide keylocker cipher key data KL2 from hash counting circuit 110B to encrypted circuit 108B.Keylocker cipher key data KL2 is produced by hash counting circuit 110B.Hash counting circuit 110B carries out hash calculating to secrete key data KH2 and the device key data KD that provides from secrete key generation circuit 109B.Encrypted circuit 108B encrypts key locker data K_LOCK2.K_LOCK2 offers error correcting code coding circuit 104 by encrypted circuit 108B encrypted secret key case data.
The secrete key data KH2 that provides from secrete key generation circuit 109B offers error correcting code coding circuit 104.The application data that produces the software player SFT1 that circuit 118 provides from software player offers error correcting code coding circuit 104.
Error correcting code coding circuit 104 usefulness CIRC (intersection interleave Reed-Solomon code) carry out the error correcting code cataloged procedure to content-data.The output of error correcting code coding circuit 104 offers the secondary sign indicating number of TOC adder circuit 113.The secondary sign indicating number of TOC adder circuit 113 is added to TOC data and secondary code data in the output of error correcting code coding circuit 104.
The output of the secondary sign indicating number of TOC adder circuit 113 offers modulation circuit 117.Modulation circuit 117 is carried out for example EFM (8-14 modulation).
Optical pick-up 121 is such mechanisms, its as the laser focusing of the semiconductor laser of light source on the signal surface of CD 1, and scanning on CD 1 with one heart or the track of spiralization.Can move upward the object lens of the laser focusing of optical pick-up 121 on CD 1 signal surface in focus direction and track side by the actuator (not shown).Under the control of servo control circuit 125, by actuator control circuit 126 control actuators.All optical pick-ups 121 are by screw mechanism 122 and in the upwards motion of the footpath of CD 1.Under the control of servo control circuit 125, by the motion of spiral control circuit 127 control screw mechanisms 122.
The output data of modulation circuit 117 offers optical pick-up 121.Its optical wavelength of optical pick-up 121 output are according to the output of modulation circuit 117 and modulated laser.The recording surface of described laser radiation CD 1.As a result, information is recorded on the CD 1.
In pen recorder, when recorded content data in program area PA1, the content-data that provides from input end 100 offers error correcting code coding circuit 104.104 pairs of content-datas of error correcting code coding circuit are carried out the error correcting code cataloged procedure.
Optical pick-up 121 moves to program area PA1.The output of error correcting code coding circuit 104 offers modulation circuit 117.The content data recording that provides from input end 100 is among program area PA1.
When recorded content data in program area PA2, encrypt by encrypted circuit 102 from the content-data that input end 101 provides, and offer error correcting code coding circuit 104.104 pairs of content-datas of error correcting code coding circuit are carried out the error correcting code cataloged procedure.
Keylockers produces circuit 105A and produces the key locker data K_LOCK1 that is recorded in the Lead-In Area L12.Keylockers produces circuit 105B and produces the key locker data K_LOCK2 that is recorded in the program area PA2.
Optical pick-up 121 moves to Lead-In Area L12.The key locker data K_LOCK1 that provides and be recorded in the Lead-In Area L12 from keylockers generation circuit 105A offers the secondary sign indicating number generation of TOC circuit 112.Key locker data K_LOCK1 is recorded among the Lead-In Area L12 of CD 1.
Optical pick-up 121 moves to Lead-In Area L12.The key locker data K_LOCK2 that provides and be recorded in the Lead-In Area L12 from keylockers generation circuit 105B offers error correcting code coding circuit 104.The output of error correcting code coding circuit 104 offers modulation circuit 107.Key locker data K_LOCK2 is recorded among the program area PA2.The application data that produces the software player SFT1 that circuit 118 provides from software player sends to error correcting code coding circuit 104.The application data of software player SFT1 is recorded among the program area PA2.
Figure 17 illustrates the real structure of the transcriber that can handle CD 1, and in the case, transcriber reproduces data from CD 1 according to the present invention.
In Figure 17, CD 1 is placed on the rotating disk (not shown) and by spindle motor 150 and rotates.Under the control of servo control circuit 151, main shaft control circuit 152 drives spindle motor 150, thus spindle motor 150 is with constant linear velocity (CLV) or Constant Angular Velocity (CAV) rotation.
When playback program district PA1, optical pick-up 155 moves to the program area PA1 of CD 1 by screw mechanism 156.Optical pick-up 155 is from the program area PA1 reading of data of CD 1.From program area PA1 content data, its data layout is identical with the form that meets the data of CD-DA standard for example.The output signal of optical pick-up 155 is extracted circuit 158 by the secondary sign indicating number of RF amplifier 157, EFM demodulator circuit 161 and TOC and is offered error correction decode circuit 162.The output signal of 162 pairs of optical pick-ups 155 of error correction decode circuit is carried out error correction procedure.The output of error correction decode circuit 162 is from output terminal 168 outputs.
When playback program district PA2, optical pick-up 155 moves to Lead-In Area L12 by screw mechanism 156.Read key locker data K_LOCK1 from Lead-In Area L12.Extract circuit 158 from the secondary sign indicating number of TOC and provide key locker data K_LOCK1 to decrypt circuit 166.Read secrete key data KH1 from Lead-In Area L12.Secrete key data KH1 extracts circuit 158 from the secondary sign indicating number of TOC and offers keylocker cipher key generation circuit 167.Device key data KD and secrete key data KH1 that keylocker cipher key generation circuit 167 usefulness are stored in the transcriber produce keylocker cipher key data KL1.Keylocker cipher key data KL1 offers decrypt circuit 166.
Optical pick-up 155 moves to program area PA2 by screw mechanism 156.From program area PA2 content data.Content-data among the program area PA2 is compressed according to for example ATRAC3, and encrypted.The output signal of optical pick-up 155 extracts circuit 158 by the secondary sign indicating number of RF amplifier 157, demodulator circuit 161 and TOC and error correction decode circuit 162 offers decrypt circuit 165.
Content key data KC1, KC2 ... offer decrypt circuit 165 from keylockers reproducing circuit 164.Content key data KC1, the KC2 that decrypt circuit 165 usefulness provide from keylockers reproducing circuit 164 ... content-data is decrypted.Content-data from output terminal 169 output deciphering.
Figure 18 illustrates the real structure of the transcriber that can not handle CD 1, and in the case, transcriber reproduces data from CD 1 according to the present invention.
In Figure 18, CD 1 is placed on the rotating disk (not shown) and by spindle motor 170 and rotates.Under the control of servo control circuit 171, main shaft control circuit 172 drives spindle motor 170, thus spindle motor 170 is with constant linear velocity (CLV) or Constant Angular Velocity (CAV) rotation.
The output signal of optical pick-up 175 offers demodulator circuit 181 by RF amplifier 177.The output signal of 181 pairs of optical pick-ups 175 of demodulator circuit is carried out the EFM-demodulation.The output data of demodulator circuit 181 offers error correction decode circuit 182.Error correction decode circuit 182 is carried out the CIRC error correction procedure.
When playback program district PA1, optical pick-up 175 moves to the program area PA1 of CD 1 by screw mechanism 176.Optical pick-up 175 is from the program area PA1 reading of data of CD 1.From program area PA1 content data, its data layout is identical with the data that meet the CD-DA standard.The output signal of optical pick-up 175 is by demodulator circuit 181 and by demodulation.Restituted signal sends to the secondary sign indicating number of TOC and extracts circuit 184 and error correction decode circuit 182.Error correction decode circuit 182 is carried out error correction procedure.The output data of error correction decode circuit 182 is exported by interface 183.
When from program area PA2 rendition of content data, carry out decrypting process by the software 191 of personal computer 190.
In other words, when playback program district PA2, optical pick-up 175 moves to program area PA2.The data of reading software player SFT1.The data of software player SFT1 are extracted circuit 184, error correction decode circuit 182 and interface 183 and are offered personal computer 190 by demodulator circuit 181, the secondary sign indicating number of TOC.
As shown in figure 19, when beginning the application of software player (step S1), read secrete key data KH2 (step S2) from program area PA2.Calculate secrete key data KH2 and device key data KD.As a result, produce keylocker cipher key data KL2 (step S3).
Read key locker data K_LOCK2 (step S4) from program area PA2.The data of the key locker data K_LOCK2 that has read are used in the keylocker cipher key data KL2 that produces among the step S3 and are decrypted.From key locker data K_LOCK2 extract content key data KC1, KC2 ... and copyright management information DRM1B, DRM2B ... (step S5).
Judge whether to send to reproduce and order (step S6).When send when reproducing order, judge be used for to reproduce content key data KC1, KC2 that order content corresponding data are decrypted ... whether be included in the key locker data K_LOCK2 that step S5 extracted content key data KC1, KC2 ... in (step S7).
When in step S7, determine to comprise be used for to reproduce content key data KC1, KC2 that order content corresponding data are decrypted ... the time, flow process advances to step S8.Judge whether can be used on the key locker data K_LOCK2 that extracts among the step S5 copyright management information DRM1B, DRM2B ... and reproduce and reproduce order content corresponding data (step S8).
When determine not comprise at step S7 be used for to reproduce content key data KC1, KC2 that order content corresponding data are decrypted ... the time, stop to reproduce operation (step S8).
When in step S8, determine with copyright management information DRM1B, DRM2B ... reproduce when reproducing order content corresponding data, optical pick-up 175 is from program area PA2 content data (step S9).Be used in the content key data KC1, the KC2 that extract from key locker data K_LOCK2 among the step S5 ... content-data is decrypted (step S10).
When in step S8, determine can according to copyright management information DRM1B, DRM2B ... and reproduce when reproducing order content corresponding data, stop to reproduce operation (step S8).
As shown in figure 17, in the time handling according to the driver of CD 1 of the present invention and player from CD 1 rendition of content data, be stored in content key data KC1, the KC2 among the key locker data K_LOCK1 in the Lead-In Area L12 ... content-data is decrypted.According to be stored in copyright management information DRM1A, the DRM2A among the key locker data K_LOCK1 in the Lead-In Area L12 ..., the reproduction of control content data and copy.
On the contrary, as Figure 18 and shown in Figure 19, when the conventional driver that can not handle CD 1 and player during from CD 1 rendition of content data, be stored in content key data KC1, the KC2 among the key locker data K_LOCK2 in the program area PA2 ... content-data is decrypted.According to be stored in copyright management information DRM1B, the DRM2B among the key locker data K_LOCK2 in the program area PA2 ..., the reproduction of control content data and copy.
As Figure 14 and shown in Figure 15, content key data KC1, the KC2 of the key locker data K_LOCK1 in high security Lead-In Area L12 ... quantity greater than content key data KC1, the KC2 of the key locker data K_LOCK2 in low confidentiality program area PA2 ... quantity.In addition, copyright management information DRM1A, the DRM2A of the key locker data K_LOCK1 in high security Lead-In Area L12 ... management condition than copyright management information DRM1B, the DRM2B of the key locker data K_LOCK2 in low confidentiality program area PA2 ... management condition more favourable.In the case, can handle the driver of CD 1 and compare with player with the driver that can not handle CD 1 with player, the former can reproduce more music program and have more added value.
In previous examples, CD is two sections dishes, and wherein, conventional content data recording district separates with the content data encrypted recording areas.Replacedly, CD can be one section dish.
In addition, in previous examples, key locker data and secrete key data are recorded in Lead-In Area and the program area.Replacedly, key locker data and secrete key data can be recorded in leading-out zone and the program area.Replacedly, key locker data and secrete key data can be recorded in Lead-In Area, leading-out zone, the program area.
According to the present invention, can handle the player of disks and drive access and be recorded in keylockers in Lead-In Area and/or the leading-out zone, obtain copyright management information and content key data, and rendition of content data.The player of disks and the keylockers in the drive access program area be can not handle, copyright management information and content key data obtained, and rendition of content data.
The keylockers that is recorded in Lead-In Area and/or the leading-out zone can be only by the transcriber visit that can handle disks.Keylockers in the program area can be by the transcriber visit that can not handle disks.Because can handle the keylockers of transcriber service recorder in Lead-In Area and/or leading-out zone of disks, confidentiality is higher.On the contrary, owing to can not handle the keylockers of transcriber service recorder in the program area of disks, therefore, confidentiality can not get guaranteeing.
According to the present invention, aspect quantity and added value, it is littler than what be recorded in keylockers in Lead-In Area and/or the leading-out zone to be recorded in the copyright management information of the keylockers in the program area and content key data, can protect copyright.In addition because by the quantity of the reproducible content that transcriber reproduced that can handle disks and quality thereof with by can not handle disks that transcriber reproduced was different, so they are distinguishing.Thereby, can promote the sale of new device.
Industrial applicability
As mentioned above the present invention be suitable for recording content-data recording medium such as CD, be used for At the recording method and device of this recording medium record content-data and for reproducing content The reproducting method of data.
Claims (47)
1. recording medium comprises:
Lead-In Area;
Outside Lead-In Area, place the data recorded area of formation, a plurality of content-datas of record on this data recorded area; And
Outside data recorded area, place the leading-out zone of formation,
Wherein, record is used to manage first copyright management information and second copyright management information of the copyright of a plurality of content-datas on the mutually different diverse location of confidentiality.
2. recording medium as claimed in claim 1,
Wherein, any in any of Lead-In Area and leading-out zone in record first copyright management information and second copyright management information, another copyright management information of record in data recorded area.
3. recording medium as claimed in claim 1,
Wherein, first copyright management information and second copyright management information are the mutually different copyright management informations of management condition, reproduce a plurality of content-datas under described management condition.
4. recording medium as claimed in claim 3,
Wherein, any in first copyright management information and second copyright management information is the management information of a plurality of content-data reproduction permission of expression, and another copyright management information is the management information of a plurality of content-data part reproduction permission of expression.
5. recording medium as claimed in claim 4,
Wherein, at one of record first copyright management information and second copyright management information in any one at least of Lead-In Area and leading-out zone.
6. recording medium as claimed in claim 5,
Wherein, another copyright management information in record first copyright management information and second copyright management information in the data field.
7. recording medium as claimed in claim 1,
Wherein, aspect the management condition of a plurality of content-datas, any in first copyright management information and second copyright management information is stricter than another copyright management information.
8. recording medium as claimed in claim 7,
Wherein, aspect the reproduction restrictive condition of a plurality of content-datas, any in first copyright management information and second copyright management information is stricter than another copyright management information.
9. recording medium as claimed in claim 8,
Wherein, any in first copyright management information and second copyright management information comprises the copy disable condition of a plurality of content-datas, and another copyright management information comprises the copy permissive condition of a plurality of content-datas.
10. recording medium as claimed in claim 9,
Wherein, Lead-In Area and leading-out zone at least in any record comprise another copyright management information of the copy permissive condition of a plurality of content-datas.
11. recording medium as claimed in claim 9,
Wherein, one of record first copyright management information and second copyright management information in data recorded area, this management information comprises the copy disable condition of a plurality of content-datas.
12. recording medium as claimed in claim 1,
Wherein, be recorded at least one encrypted and record of a plurality of content-datas in the data recorded area, and,
Wherein, first copyright management information and second copyright management information are recorded with key data, and key data is used for content data encrypted is decrypted.
13. recording medium as claimed in claim 12,
Wherein, first copyright management information and second copyright management information be encrypted and record with key data, and key data is used for content data encrypted is decrypted.
14. a recording method may further comprise the steps:
The a plurality of content-datas of record on recording medium; And
Record first copyright management information and second copyright management information on the recording medium diverse location, described information is used to manage the copyright of a plurality of content-datas, and wherein, the confidentiality of diverse location is different.
15. recording method as claimed in claim 14,
Wherein, at one of record first copyright management information and second copyright management information in any at least of Lead-In Area and leading-out zone, wherein, the inboard of writing down the recording areas of a plurality of content-datas therein forms Lead-In Area, and at the periphery of recording areas formation leading-out zone, and
Wherein, another copyright management information of record in recording areas.
16. recording method as claimed in claim 15,
Wherein, first copyright management information and second copyright management information are the mutually different copyright management informations of management condition, reproduce a plurality of content-datas under described management condition.
17. recording method as claimed in claim 16,
Wherein, any in first copyright management information and second copyright management information is the management information of a plurality of content-data reproduction permission of expression, and another copyright management information is the management information of a plurality of content-data part reproduction permission of expression.
18. recording method as claimed in claim 15,
Wherein, aspect the management condition of a plurality of content-datas, any in first copyright management information and second copyright management information is stricter than another copyright management information.
19. recording method as claimed in claim 18,
Wherein, aspect the reproduction restrictive condition of a plurality of content-datas, any in first copyright management information and second copyright management information is stricter than another copyright management information.
20. recording method as claimed in claim 19,
Wherein, any in first copyright management information and second copyright management information comprises the copy disable condition of a plurality of content-datas, and another copyright management information comprises the copy permissive condition of a plurality of content-datas.
21. recording method as claimed in claim 20,
Wherein, Lead-In Area and leading-out zone at least in any record comprise another copyright management information of the copy permissive condition of a plurality of content-datas.
22. recording method as claimed in claim 20,
Wherein, one of record first copyright management information and second copyright management information in data recorded area, this management information comprises the copy disable condition of a plurality of content-datas.
23. recording method as claimed in claim 14,
Wherein, the encrypted and record of at least one in a plurality of content-datas, and,
Wherein, first copyright management information and second copyright management information are recorded with key data, and key data is used for content data encrypted is decrypted.
24. recording method as claimed in claim 23,
Wherein, first copyright management information and second copyright management information be encrypted and record with key data, and key data is used for content data encrypted is decrypted.
25. recording medium as claimed in claim 15,
Wherein, record and the relevant data of software that are used to read another copyright management information in recording areas, a plurality of content-datas of record in recording areas.
26. a recording medium recording device comprises:
Be used for head at the recording medium identifying recording layer;
Be used for data execution cataloged procedure that will write down and the encoding process part that coded data is offered described head; And
The control section that is used on recording medium, writing down a plurality of content-datas and controls described head, thereby described head is first copyright management information of the copyright that is used to manage a plurality of content-datas and the diverse location that second copyright management information records recording medium, and the confidentiality of diverse location is different.
27. recording medium recording device as claimed in claim 26,
Wherein, control section is configured to carry out following control, make one of record first copyright management information and second copyright management information in any at least at Lead-In Area and leading-out zone, wherein, the inboard of writing down the recording areas of a plurality of content-datas therein forms Lead-In Area, and at the periphery of recording areas formation leading-out zone, and
Wherein, control section is configured to carry out following control, makes to write down another copyright management information in recording areas.
28. recording medium recording device as claimed in claim 27,
Wherein, first copyright management information and second copyright management information are the mutually different copyright management informations of management condition, reproduce a plurality of content-datas under described management condition.
29. recording medium recording device as claimed in claim 28,
Wherein, any in first copyright management information and second copyright management information is the management information of a plurality of content-data reproduction permission of expression, and another copyright management information is the management information of a plurality of content-data part reproduction permission of expression.
30. recording medium recording device as claimed in claim 27,
Wherein, aspect the management condition of a plurality of content-datas, any in first copyright management information and second copyright management information is stricter than another copyright management information.
31. recording medium recording device as claimed in claim 30,
Wherein, aspect the reproduction restrictive condition of a plurality of content-datas, any in first copyright management information and second copyright management information is stricter than another copyright management information.
32. recording medium recording device as claimed in claim 31,
Wherein, any in first copyright management information and second copyright management information comprises the copy disable condition of a plurality of content-datas, and another copyright management information comprises the copy permissive condition of a plurality of content-datas.
33. recording medium recording device as claimed in claim 32,
Wherein, Lead-In Area and leading-out zone at least in any record comprise another copyright management information of the copy permissive condition of a plurality of content-datas.
34. recording medium recording device as claimed in claim 32,
Wherein, one of record first copyright management information and second copyright management information in data recorded area, this management information comprises the copy disable condition of a plurality of content-datas.
35. recording medium recording device as claimed in claim 26,
Wherein, control section is configured to encrypt and write down at least one in a plurality of content-datas, and writes down first copyright management information and second copyright management information with key data, and wherein, key data is used for content data encrypted is decrypted.
36. recording medium recording device as claimed in claim 35,
Wherein, control section is configured to first copyright management information and second copyright management information and key data are encrypted and record together, and wherein, key data is used for content data encrypted is decrypted.
37. a recording medium reproducing method may further comprise the steps:
Read first copyright management information and second copyright management information any from recording medium, described recording medium comprises Lead-In Area, places the data recorded area that wherein writes down a plurality of content-datas of formation and the leading-out zone of placing formation outside data recorded area outside Lead-In Area, wherein, record is used to manage first copyright management information and second copyright management information of the copyright of a plurality of content-datas on the mutually different diverse location of confidentiality; And
According to the copyright management information that has read and at least one of control content data reproduced operation, wherein, content-data reads from the data field.
38. recording medium reproducing method as claimed in claim 37,
Wherein, any in any of Lead-In Area and leading-out zone in record first copyright management information and second copyright management information, another copyright management information of record in data recorded area.
39. recording medium reproducing method as claimed in claim 38,
Wherein, record and the relevant data of software that are used to read another copyright management information in recording medium, and
Wherein, after reading the data relevant, read another copyright management information with software.
40. recording medium reproducing method as claimed in claim 37,
Wherein, first copyright management information and second copyright management information are the mutually different copyright management informations of management condition, reproduce a plurality of content-datas under described management condition.
41. recording medium reproducing method as claimed in claim 40,
Wherein, any in first copyright management information and second copyright management information is the management information of a plurality of content-data reproduction permission of expression, and another copyright management information is the management information of a plurality of content-data part reproduction permission of expression.
42. recording medium reproducing method as claimed in claim 41,
Wherein, at one of record first copyright management information and second copyright management information in any at least of Lead-In Area and leading-out zone.
43. recording medium reproducing method as claimed in claim 42,
Wherein, another copyright management information in record first copyright management information and second copyright management information in the data field.
44. recording medium reproducing method as claimed in claim 37,
Wherein, aspect the management condition of a plurality of content-datas, any in first copyright management information and second copyright management information is stricter than another copyright management information.
45. recording medium reproducing method as claimed in claim 44,
Wherein, aspect the reproduction restrictive condition of a plurality of content-datas, any in first copyright management information and second copyright management information is stricter than another copyright management information.
46. recording medium reproducing method as claimed in claim 37,
Wherein, at least one that is recorded in a plurality of content-datas in the data recorded area encrypted and record,
Wherein, first copyright management information and second copyright management information are recorded with key data, and key data is used for content data encrypted is decrypted, and
Wherein, use the key data that reads from recording medium that enciphered data is decrypted.
47. recording medium reproducing method as claimed in claim 46,
Wherein, first copyright management information and second copyright management information be encrypted and record with key data, and key data is used for content data encrypted is decrypted.
Wherein, another key data that record is used for enciphered data is decrypted on recording medium, and
Wherein, use other key data that reads from recording medium that first copyright management information, second copyright management information and key data are decrypted at least.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP389749/2001 | 2001-12-21 | ||
JP2001389749A JP3873740B2 (en) | 2001-12-21 | 2001-12-21 | Recording medium, recording method and apparatus, and reproducing method and apparatus |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1507623A true CN1507623A (en) | 2004-06-23 |
CN100527243C CN100527243C (en) | 2009-08-12 |
Family
ID=19188292
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB028053125A Expired - Fee Related CN100527243C (en) | 2001-12-21 | 2002-12-19 | Recording method, recording apparatus, and reproduction method |
Country Status (9)
Country | Link |
---|---|
US (1) | US7406177B2 (en) |
EP (1) | EP1457983A4 (en) |
JP (1) | JP3873740B2 (en) |
KR (1) | KR20040062874A (en) |
CN (1) | CN100527243C (en) |
AU (1) | AU2002366232B2 (en) |
RU (1) | RU2255381C2 (en) |
TW (1) | TWI223246B (en) |
WO (1) | WO2003054881A1 (en) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7600260B2 (en) | 2003-06-30 | 2009-10-06 | Panasonic Corporation | Information recording medium and reproduction apparatus therefor |
US7620993B2 (en) * | 2003-08-05 | 2009-11-17 | Panasonic Corporation | Copyright protection system, key generation apparatus, recording apparatus, reproduction apparatus, read-out apparatus, decryption apparatus, recording medium, recording method and program |
US7685646B1 (en) * | 2003-09-10 | 2010-03-23 | Realnetworks, Inc. | System and method for distributing protected audio content on optical media |
WO2005024820A1 (en) * | 2003-09-10 | 2005-03-17 | Koninklijke Philips Electronics N.V. | Content protection method and system |
KR20050096040A (en) * | 2004-03-29 | 2005-10-05 | 삼성전자주식회사 | Method for playbacking content using portable storage by digital rights management, and portable storage for the same |
JP4073892B2 (en) * | 2004-05-10 | 2008-04-09 | 株式会社ソニー・コンピュータエンタテインメント | Content reproduction apparatus, content reproduction method, and computer program |
CN101048820A (en) * | 2004-10-21 | 2007-10-03 | 皇家飞利浦电子股份有限公司 | Method of saving keylockers on optical discs |
JP4692003B2 (en) * | 2005-02-10 | 2011-06-01 | ソニー株式会社 | Information processing apparatus, information processing method, and computer program |
FR2923645B1 (en) * | 2007-11-09 | 2010-01-08 | Thierry Prigent | DATA RECORDING METHOD FOR LONG-TERM READING OF THESE DATA |
US9081979B2 (en) * | 2011-12-29 | 2015-07-14 | Konica Minolta Laboratory U.S.A., Inc. | Document control based on copyright permission when printing compilation of works |
US9459955B2 (en) * | 2012-05-24 | 2016-10-04 | Sandisk Technologies Llc | System and method to scramble data based on a scramble key |
US20140137208A1 (en) * | 2012-11-14 | 2014-05-15 | Executive Briefing Book Company, Llc | Mobile computing device-based secure briefing system |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH04163768A (en) | 1990-10-29 | 1992-06-09 | Hitachi Ltd | Disk security system and apparatus |
US6516064B1 (en) * | 1995-07-25 | 2003-02-04 | Sony Corporation | Signal recording apparatus, signal record medium and signal reproducing apparatus |
US6289102B1 (en) * | 1995-10-09 | 2001-09-11 | Matsushita Electric Industrial Co., Ltd. | Apparatus and method for preventing unauthorized use of information recorded on an information recording medium |
JPH09171481A (en) * | 1995-10-19 | 1997-06-30 | Sony Corp | Formatting method and recording medium |
EP0898777B1 (en) * | 1996-05-15 | 2007-04-11 | Intertrust Technologies Corp | Method and apparatus for accessing content stored on a dvd |
JP4032528B2 (en) * | 1998-02-05 | 2008-01-16 | 日本ビクター株式会社 | Audio disc, encoding device, decoding device, and copyright management method |
JP3403636B2 (en) * | 1998-04-06 | 2003-05-06 | パイオニア株式会社 | Information recording medium and reproducing apparatus therefor |
JP2000196585A (en) | 1998-10-08 | 2000-07-14 | Matsushita Electric Ind Co Ltd | Recording medium recording contents, digital data recorder, digital data reproducer, contents packaging device generating package, contents reproducer, computer readable recording medium, recording method, reproducing method, packaging method and system transport stream processor consisting of contents packaging device and contents reproducer |
US6580683B1 (en) * | 1999-06-23 | 2003-06-17 | Dataplay, Inc. | Optical recording medium having a master data area and a writeable data area |
EP1089273A3 (en) * | 1999-09-30 | 2002-08-28 | Matsushita Electric Industrial Co., Ltd. | Information recording medium for recording a scrambled part of content information, and method and apparatus for reproducing information recorded therein |
KR100716770B1 (en) * | 1999-11-16 | 2007-05-14 | 소니 가부시끼 가이샤 | Recording medium, data recording method and apparatus, data reproducing method and apparatus, and copying control method |
JP3728621B2 (en) * | 2000-02-10 | 2005-12-21 | 松下電器産業株式会社 | Digital data copy control method and playback apparatus |
KR100896247B1 (en) * | 2001-10-31 | 2009-05-08 | 소니 가부시끼 가이샤 | Recording device of recording medium, reproducing method and reproducing device of recording medium |
-
2001
- 2001-12-21 JP JP2001389749A patent/JP3873740B2/en not_active Expired - Fee Related
-
2002
- 2002-12-13 TW TW091136141A patent/TWI223246B/en not_active IP Right Cessation
- 2002-12-19 AU AU2002366232A patent/AU2002366232B2/en not_active Ceased
- 2002-12-19 KR KR10-2003-7010931A patent/KR20040062874A/en not_active Application Discontinuation
- 2002-12-19 US US10/468,786 patent/US7406177B2/en not_active Expired - Fee Related
- 2002-12-19 RU RU2003125883/28A patent/RU2255381C2/en not_active IP Right Cessation
- 2002-12-19 CN CNB028053125A patent/CN100527243C/en not_active Expired - Fee Related
- 2002-12-19 WO PCT/JP2002/013300 patent/WO2003054881A1/en active Application Filing
- 2002-12-19 EP EP02790809A patent/EP1457983A4/en not_active Withdrawn
Also Published As
Publication number | Publication date |
---|---|
AU2002366232A1 (en) | 2003-07-09 |
TWI223246B (en) | 2004-11-01 |
US20040096189A1 (en) | 2004-05-20 |
JP2003196920A (en) | 2003-07-11 |
TW200400496A (en) | 2004-01-01 |
EP1457983A1 (en) | 2004-09-15 |
CN100527243C (en) | 2009-08-12 |
WO2003054881A1 (en) | 2003-07-03 |
AU2002366232B2 (en) | 2008-09-18 |
US7406177B2 (en) | 2008-07-29 |
KR20040062874A (en) | 2004-07-09 |
RU2003125883A (en) | 2005-02-20 |
EP1457983A4 (en) | 2009-09-16 |
JP3873740B2 (en) | 2007-01-24 |
RU2255381C2 (en) | 2005-06-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1299260C (en) | Recording apparatus, recording medium, playback apparatus, recording method and playback method | |
CN1208727C (en) | Mutual authentication method, recording device, playback device and recording medium | |
CN1130716C (en) | Information recording medium and information reproducing method and information reproducing device | |
CN1340192A (en) | Recording medium, data recording method and apparatus, data reproducing method and apparatus, and copying control method | |
CN1381054A (en) | Recording medium, recording meidum recording method, output control method, reproducing apparatus, recording/reproducing control method, recording method | |
CN1355919A (en) | Optical disk, optical disk recording and reproducing apparatus, method for recording reproducing, and delecting data on optical disk, and information procesisng system | |
CN1531730A (en) | Recording medium reproduction method and reproduction apparatus and recording medium recording method and recording apparatus | |
CN1471100A (en) | Recording medium, recording medium management method and recording medium management system | |
CN1627414A (en) | Data recording apparatus | |
CN1833233A (en) | Record regeneration device, data processing device and record regeneration processing system | |
CN1203470C (en) | Optical recording medium, recorder for optical recording medium, method for recording the same, reproducing device and reproducing method therefor | |
CN1266699C (en) | Data reproducing device and method, data recording device and method, circuit element | |
CN1507623A (en) | Recording medium, recording method, recording apparatus, and reproduction method | |
CN1483198A (en) | Record medium, recording method and apparatus for record medium, and reproducing method and apparatus for record medium | |
CN1881219A (en) | Method for converting non copy protected data into copy protected data | |
CN1386277A (en) | Data recording method, data recording apparatus, and recording medium | |
CN1465062A (en) | Data recording apparatus and method, and data reproduction apparatus and method | |
CN100351937C (en) | Information recording device and method, information reproducing device and method, recording medium program and disc recording medium | |
CN1465046A (en) | Data recording medium, recording medium recording and, reproducing apparatus, and recording or reproducing method | |
CN1229740C (en) | Reproducing device and copy control method | |
CN1263011C (en) | Information recording disc, recording and/or reproducing device and method | |
CN1645500A (en) | Information recording processing apparatus, information reproduction processing apparatus, information recording medium, information recording processing method, information reproduction processing me | |
CN1261941C (en) | Recorded medium reproducing device and method, data output controlling method, data outputting method, error detecting method, and data outputting reproducing method | |
CN1179350C (en) | Information recording apparatus, method and medium, information reproducing apparatus and method | |
CN1754226A (en) | Recording medium, recording device and reproducing device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20090812 Termination date: 20100119 |